home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
DP Tool Club 31
/
CDASC_31_1996_juillet_aout.iso
/
vrac
/
ctart_e.zip
/
CONT1.DAT
< prev
next >
Wrap
Text File
|
1995-12-22
|
6KB
|
287 lines
1.
-Annihilation of defence // 0-0
1.1
--Annihilation of the pieces defending // 0-0
*-other pieces
1.2
--Annihilation of the pieces defending // 0-0
*-the back rank
1.3
--Annihilation of the pieces defending // 0-0
*-the king, the most important squares
*-and files
1.4
--Annihilation of the pawns defending // 0-0
*-the most important squares and files
1.5
--Annihilation of the pinning pieces // 0-0
2.
-Distraction // 0-0
2.1
--Distraction of the pieces defending // 0-0
*-other pieces
2.2
--Distraction of the pieces defending // 0-0
*-the back rank
2.3
--Distraction of the pieces defending // 0-0
*-the most important files
2.4
--Distraction of the pieces defending // 0-0
*-the most important squares
2.5
--Distraction of the pawns // 0-0
2.6
--Unblocking the pawns with the help // 0-0
*-of distraction
2.7
--Distraction of the pinning pieces // 0-0
2.8
--Distraction of the pieces carrying // 0-0
*-out the dangerous threats
3.
-Decoy // 0-0
3.1
--Decoy of a king to a mating net // 0-0
3.2
--Decoy to a knight fork // 0-0
3.3
--Decoy to a queen double attack // 0-0
3.4
--Decoy to a file blow // 0-0
3.5
--Exploiting an open attack // 0-0
3.6
--Decoy for a pin // 0-0
3.7
--Other cases of decoy // 0-0
4.
-Open attack // 1-11
4.1
--Execution of an open attack // 0-0
4.2
--Removal of obstacles // 0-0
4.3
--Decoy to an attacked file // 1-6
4.4
--Decoy to a blow dealt by the piece // 0-0
*-moved away
4.5
--Placement of the attacking piece // 7-11
*-to the file for attack
4.6
--"Mill" // 0-0
4.7
--Exploiting an open attack in the // 0-0
*-attack on a king
5.
-Opening of a file // 0-0
5.1
--The h- (a-) file // 0-0
5.2
--The g- (b-) file // 0-0
5.3
--The f- (c-) file // 0-0
5.4
--The d- and e-files // 0-0
5.5
--Ranks // 0-0
5.6
--The a1-h8 (h1-a8) diagonal // 0-0
5.7
--The a2-g8 (h7-b1) diagonal // 0-0
5.8
--Other diagonals // 0-0
5.9
--Conjunction of files, ranks and // 0-0
*-diagonals
6.
-Space clearance // 0-0
6.1
--File clearance // 0-0
6.2
--Rank clearance // 0-0
6.3
--Diagonal clearance // 0-0
6.4
--Clearance of several files // 0-0
6.5
--Square clearance // 0-0
7.
-X-ray attack // 0-0
8.
-Interception // 0-0
8.1
--Execution of interception // 0-0
8.2
--Interception of potentially // 0-0
*-important files
8.3
--Double interception // 0-0
8.4
--Interception with distraction // 0-0
8.5
--Interception with decoy // 0-0
8.6
--Interception with open attack // 0-0
8.7
--Interception with space clearance // 0-0
9.
-Blocking, encirclement // 0-0
9.1
--Smothered mate // 0-0
9.2
--Other methods of blocking a king // 0-0
9.3
--Blocking of the pieces and pawns // 0-0
*-protecting a king
9.4
--Encirclement // 0-0
10.
-Destruction of the pawn shelter // 0-0
10.1
--The king is defended by fianchetto // 0-0
10.1.1
---The bishop is absent // 0-0
10.1.2
---The fianchettoed bishop defends // 0-0
*--a king
10.1.3
---"Sieve" structure. A bishop is // 0-0
*--outside the "fianchetto"
10.2
--One pawn protects the king // 0-0
10.3
--Two pawns protect the king // 0-0
10.4
--Three pawns protect the king // 0-0
10.4.1
---The pawns are on f7, g7 and h6 // 0-0
10.4.2
---The pawns are on f6, g7 and h7 // 0-0
10.4.3
---The pawns are on f6, g7 and h6 // 0-0
10.4.4
---The pawns are on f7, g7 and h7 // 0-0
10.4.5
---Other pawn configurations // 0-0
10.5
--A king is protected by the pawns // 0-0
*-placed on the sixth and fifth ranks
10.6
--Peculiarities of the attack in // 0-0
*-a Q-side castling position
10.7
--Attack on an uncastled king // 0-0
11.
-Pawn promotion // 0-0
11.1
--Pawn breakthrough // 0-0
11.2
--Distraction from a passed pawn // 0-0
11.3
--Interception or blocking // 0-0
11.4
--A pawn is promoted to a knight // 0-0
11.5
--Forcing necessary exchanges // 0-0
11.6
--Both opponents have dangerous // 0-0
*-passed pawns
11.7
--Passed pawn supports the piece // 0-0
*-invasion of the back rank
11.8
--Passed pawn takes part in the attack // 0-0
*-on a king
11.9
--Conjunction of methods // 0-0
12.
-Intermediate move. Winning of a tempo // 0-0
12.1
--Intermediate move // 0-0
12.2
--Winning of a tempo // 0-0
12.3
--"Ignoring" the threat // 0-0
13.
-Play for a stalemate // 0-0
14.
-Restricting of material // 0-0
15.
-Pursuit // 0-0
15.1
--Pursuit of a king // 0-0
15.2
--Pursuit of a queen // 0-0
16.
-Conjunction of tactical methods // 0-07
16.1
--Exploiting a passed pawn // 0-0
16.2
--Exploiting a double attack // 0-0
16.2.1
---Knight double attack // 0-0
16.2.2
---Bishop double attack // 0-0
16.2.3
---Rook double attack // 0-0
16.2.4
---Queen double attack // 0-0
16.2.5
---Conjunction of double attacks // 0-0
16.3
--Exploiting an open attack // 0-0
16.4
--Exploiting a pin // 0-0
16.5
--Counterblow by a "pinned" piece // 0-0
16.6
--Attack on a king // 0-0
16.6.1
---Threats along the back rank // 0-0
16.6.2
---Threats along the h-file // 0-0
16.6.3
---Attack on a king unprotected // 0-0
*--by the pawns
16.6.4
---Attack on an uncastled king // 0-0
16.6.5
---"Dragging the king out" // 0-0
16.6.6
---A king is protected // 0-0
*--by fianchetto
16.6.7
---One pawn protects the king // 0-0
16.6.8
---Two pawns protect the king // 0-0
16.6.9
---Three pawns protect the king // 0-0
16.7
--Combinations to win material // 0-0
16.8
--Conjunction of threats to attack // 0-0
*-the king and to win material
16.8.1
---Conjunction of threats to attack // 0-0
*--the king and the queen
16.8.2
---Conjunction of threats to attack // 0-0
*--the king and to attack the other pieces